Cybersecurity certification first to address behavioural analytics

  • Published in

CompTIA Cybersecurity Analyst (CSA+) becomes first training tool incorporating in-depth behavioural analytics for cybersecurity defences.

Read More

NEWS

Growing security, and compliance challenges in face of increasing cloud services adoption

  • Published in

The average company runs 464 custom applications; and more than 70 percent of these are business-critical.

Read More

Only three percent of businesses equipped to meet security attacks

  • Published in

New study from Tripwire reveals that most organizations are seriously lacking in both skills and technology to address today’s most critical attack types.

Read More

Geopolitical changes drive data privacy concerns

  • Published in

Only 29% of respondents say they have high levels of confidence in their organizations’ ability to secure and protect encrypted communication.

Read More

European companies are 'too slack' in preventing cybercrime

  • Published in

Cybersecurity threat list for 2017 from Fujitsu Security Operations Center highlights critical enterprise vulnerabilities.

Read More

Google security support

  • Published in

nShield HSM “bring your own key” now available for Google customers supplying keys.

Read More

McAfee has introduced significant enhancements to its Secure Access Service Edge (SASE) solution...
Nearly three in four employees (72 percent) are willing to share sensitive, confidential or...
Critical infrastructures are radically transforming on an unprecedented scale, boosted by a rapid...
By Chris Stoneff, director of professional services at Lieberman Software Corporation.
The study on ransomware, conducted by cybersecurity experts at Hornetsecurity, also found that...
The combined portfolio will deliver real-time advanced encrypted traffic analysis, expand network...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more